Re: Some broken links on the openpgp website

2014-05-19 Thread Werner Koch
On Fri, 16 May 2014 17:34, a...@riseup.net said: * Links for list pages are broken in https://lists.gnupg.org/: there's a port (8002) in the urls which if you remove will take you to the correct pages. These links are ok in https://www.gnupg.org/documentation/mailing-lists.html Boa

Re: gnupg smartcard on boot for LUKS on sid debian howto ?

2014-05-19 Thread tux . tsndcb
Hello Peter, First good news, as I tell you during initramfs generation, I see no trace for /etc/key/cryptkey.gpg, but this file is obligatory OK because passphrase works on boot (with gpg.conf in /etc/keys) (may be it it's because my test is for /data/test encrypted FS and not /) But I've

Re: gnupg smartcard on boot for LUKS on sid debian howto ?

2014-05-19 Thread Peter Lebbing
Hello, First good news, as I tell you during initramfs generation, I see no trace for /etc/key/cryptkey.gpg, but this file is obligatory OK because passphrase works on boot (with gpg.conf in /etc/keys) (may be it it's because my test is for /data/test encrypted FS and not /) Indeed you will

Re: gnupg smartcard on boot for LUKS on sid debian howto ?

2014-05-19 Thread tux . tsndcb
Hello Peter - Mail original - De: Peter Lebbing pe...@digitalbrains.com À: tux tsndcb tux.tsn...@free.fr Cc: gnupg-users@gnupg.org Envoyé: Lundi 19 Mai 2014 20:01:38 Objet: Re: gnupg smartcard on boot for LUKS on sid debian howto ? But I've always : gpg: pcsc_etablish_context failed:

Re: GPG's vulnerability to quantum cryptography

2014-05-19 Thread p . h . delgado
On 05/13/2014 04:03 PM, David Q. wrote: For this reason, what I do today is share long keys with people I know *in person*. We then use regular AES-256 to encrypt/decrypt our messages back and forth. Every 6 months we meet in person to renew our keys. You are right, but, in my opinion, for

Re: GPG's vulnerability to quantum cryptography

2014-05-19 Thread Robert J. Hansen
I do however believe that factoring a product of two large prime numbers might either be the subject of a sudden mathematical breakthrough, or that the solution is already known to my adversaries but this fact has been kept secret. tl;dr summary of the rest of this email -- don't focus on